Your research proposal will be based on an “issue or problem” aligned with the requirements and criteria for obtaining the BA Degree in Security Management. The essential criteria include the seven undergraduate security management program learning outcome objectives:
· Identify organizational security risk exposure; identify cost-effective mitigation
strategies; and prepare for recovery strategies.
· Employ the use of risk analysis and vulnerability assessment processes.
· Critically examine the variety and extent of losses from criminal acts, natural disasters, and security breaches facing society.
· Analyze or compare and contrast concepts of information security, personnel security, and physical security and determine the planning approaches to prevent business losses.
· Analyze the trends affecting security and loss prevention and determine the approaches to reduce losses facing businesses and institutions.
· Evaluate, from a multi-disciplinary approach, non-traditional approaches to crime prevention.
· Distinguish between traditional criminal justice roles, function, theories, and concepts as a reactive institution to the security roles a preventive societal institution.
Your research application will propose an examination of a current issue or problem in security management.
You are to compare and contrast the selected issue or problem with past, present and potential future trends or solutions. Alternatively, you may compare and contrast the experience of organizations affected by a security industry trend or whom have developed solutions to the problem and conduct analysis of their success or failure.
Topic Selection: Topic selection may be difficult. Typically, a capstone research candidate has a general idea of an area within the discipline of security management they wish to explore. Students are encouraged to select a topic they are interested in, but which also has applicability to their organization. In this instance, personal enjoyment is combined with the satisfaction of potentially improving the security posture of your organization.
Research Topic: Conduct a review of previous studies: Begin your research with the tools and capable librarian/archivists available to you in the APUS Online Research Center.
Running head:
RESEARCH PROPOSAL
1
RESEARCH PROPOSAL 3
RESEARCH PROPOSAL
Randy Calvo
SCMT 498 1001
February 17, 2020
Comment by Yvette Aguiar: An abstract was required.
A Multilayered Physical Security Approach
Introduction
The purpose of a physical protection system is to protect a system or facility against potential attacks. In high-risk facilities, the main function of protection systems is described by the philosophy of ‘detect, delay, and respond’. The protection system is required to detect when a system or facility is under attack and delay the adversary from achieving their attack objectives. The adversaries are delayed for long enough to allow for there to be an effective response which can interrupt and ultimately neutralize the threat (Deng & Mahadevan, 2015). The ability of a protection system to accomplish its objectives can be measured by assessing the probability an attack is detected in time for an effective response to be initiated. The ability of the system to accomplish its objectives can also be measured by assessing the probability that a response is able to neutralize a threat’s attack. This research topic will evaluate the different physical security measures needed to adequately detect and deter security intrusion, both cyber and physical. Comment by Yvette Aguiar: Remove background Comment by Yvette Aguiar: You may want to start with, “The problem to be addressed is…or The purpose of this study is to…”
Problem Statement
Physical security measures are essential to protect personnel as well as property from harm. Multiple layers of interdependent systems make up the physical security system. They include security guards, CCTV cameras, fire protection, and access control among others. These systems are prone to failure thus the need to have multiple layers to enhance security. The importance of using a multilayered physical security approach is to ensure that security is enhanced even with failure of a single layer of the system. A complete breakdown of security due to a single failure can have devastating effects. It becomes important to enhance understanding on the importance of a multilayered physical security approach. This research aims to evaluate different physical security measures required to effectively detect and deter any security intrusion. It aims at addressing these research questions:
1. What are the different methods of physical security measures?
2. What are the challenges of having a single layer physical security measure?
3. How does a multilayered physical security approach enhance security?
Objectives
The key goal of this research is to illustrate how a multilayered physical security approach is essential in detecting and deterring physical security threats. It aims at illustrating the benefits of a multilayered physical security system in minimizing security threats. The study aims at meeting these sub-objectives: Comment by Yvette Aguiar: Is the research question measurable and will the process produce data that can be supported or contradicted?
Examples,
How does the level of security impact on work place violence?
What is the relationship, if any, between physical security and IT security?
What are the effects of security measures in the U. S. Army after the 9/11, terrorist attacks?
1. To provide a comprehensive list of physical security measures practiced.
2. To evaluate challenges of a single layer physical security system.
3. To illustrate the benefits of multilayered physical security system.
Methodology Comment by Yvette Aguiar: The methods section describes the rationale for the application of specific procedures or techniques used to identify, select, and analyze information applied to understanding the research problem, thereby, allowing the reader to critically evaluate a study’s overall validity and reliability. The methodology section of a research should answer two main questions: How is the data collected or generated? And, how will the data be analyzed? The writing should be direct and precise and always written in the past tense.
This study will be conducted through both secondary and primary research methods. Secondary research will include thorough analysis of the literature review and primary research will include visiting different companies to evaluate their physical security measures practices.
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.